IT

Rozwiązania IT stosowane przeze mnie:

Wersja SQL-a —————————————————- 01.12.2021
select @@version

sfc i DISM —————————————————– 30.11.2021

sfc /scannow
DISM.exe /Online /Cleanup-image /Restorehealth
DISM.exe /Online /Cleanup-Image /RestoreHealth /Source:C:\RepairSource\Windows /LimitAccess

Windows 11 —————————————————— 09.11.2021

https://www.instalki.pl/aktualnosci/software/50677-nie-da-sie-zainstalowac-aktualizacji-windows-11-co-zrobic.html?fbclid=IwAR21pxMy6xoELAwDbB8I2RUtCPqu2LBi_PyKPaQ4IU8jmg5ctaWZrGp0KFg

Windows 11 —————————————————— 07.11.2021
Folder o nazwie:
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Tryb „Boga”

psexec64 użycie ————————————————- 15.12.2020

@echo off
rem C:\TMP\PS\psexec64.exe -u admin -p haslo "C:\Program Files (x86)\Datacolor\Spectrum\Datacolor Tools\DatacolorTools.exe" select

rem 7z x archive.zip -oc:\soft *.cpp -r
del C:\TMP\Data_Color.exe /q
"C:\Program Files\7-Zip\7z.exe" x C:\TMP\Data_Color.7z -oC:\TMP *.exe -r
C:\TMP\PS\psexec64.exe -u admin -p haslo "C:\Program Files (x86)\Datacolor\Spectrum\Datacolor Tools\DatacolorTools.exe" select

Czyszczenie Windows Update ————————————– 10.01.2017


net stop wuauserv
net stop cryptsvc
ren %windir%\SoftwareDistribution SoftwareDistributionOld
ren %windir%\System32\SoftwareDistribution SoftwareDistributionOld
ren %windir%\System32\CatRoot2 CatRoot2Old
net start wuauserv
net start cryptsvc

Restart Windows update


net stop wuauserv
net stop cryptSvc
net stop bits
net stop msiserver

net start wuauserv
net start cryptSvc
net start bits
net start msiserver

Czyszczenie bufora wydruku ———————————– 11.12.2020

@echo off
echo Czyszczenie bufora wydruku
net stop spooler
echo Trwa usuwanie dokumentow w kolejce drukowania
del /q /f /s "%systemroot%\system32\spool\PRINTERS\*.*"
net start spooler
echo Pomyslnie wykonano wszystkie czynnosci

net use \\192.168.1.177 /user:druk druk
rem net use \\192.168.1.200\acer /user:root haslo
rem powershell Add-Printer -ConnectionName \\192.168.1.177\L2700
timeout /t 5
rundll32 printui.dll,PrintUIEntry /y /q /n "\\192.168.1.177\L2700"
rem printui /s /t2 

Cacls / icacls ————————————————– 11.03.2021

Cacls "C:\Program Files\Java" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Green" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Microsoft Office" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Firefox" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Thunderbird" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\OpenVPN" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\PDFCreator" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Samsung" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\TrueCrypt" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\PDFCreator" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\Mozilla Maintenance Service" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\MozBackup" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files\STMicroelectronics" /E /T /C /G "Użytkownicy":F
Cacls "C:\Program Files " /E /T /C /G "Użytkownicy":F
icacls "C:\BACKUP\*" /t /grant user:(f)
icacls "c:\TMP\Migracja\*" /t /grant iga@domena:(f)
icacls "C:\Program Files\*" /t /grant jurale:(f)
icacls "C:\Program Files (x86)\Mozilla Maintenance Service*" /t /grant user:(f)
icacls "C:\Program Files (x86)\e-Deklaracje\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Google\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Krajowa Izba Rozliczeniowa S.A\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Mozilla Thunderbird\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\OpenOffice 4\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Windows Live\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Windows Mail\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Adobe\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\GOFIN\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Krajowa Izba Rozliczeniowa S.A\*" /t /grant user:(f)
icacls "C:\Program Files (x86)\Certum\*" /t /grant user:(f)
icacls "C:\Program Files\7-Zip\*" /t /grant jurale:(f)
icacls "C:\Program Files\Advanced Card Systems Ltd\*" /t /grant jurale:(f)
icacls "C:\Program Files\Mozilla Firefox\*" /t /grant jurale:(f)
icacls "C:\Program Files\Java\*" /t /grant jurale:(f)
icacls "\*" /t /grant jurale:(f)
icacls "\*" /t /grant jurale:(f)

robocopy.exe Składnia ——————————————- 06.05.2019

robocopy.exe c:\Users\Symfonia\Desktop\ k:\Dane_User\A\Desktop /Z /W:2 /R:3 /E /LOG:C:\TMP\Log\Robbo_Log_Desktop_%date%.txt
robocopy.exe c:\Users\Symfonia\Documents\ k:\Dane_User\A\Documents /Z /W:2 /R:3 /E /LOG:C:\TMP\Log\Robbo_Log_Document_%date%.txt

Ważne komedny z Uruchom —————————————– 07.11.2021

desk.cpl ,,
control

Net user ——————————————————– 23.10.2021

net user User ZAQ12wsx /ADD /FULLNAME:"Imię Nazwisko" /PASSWORDCHG:NO 
          ^nazwa ^ hasło ^ dodać ^ nazwa wyświtlana             ^ nie może zmienić hasła
Dodanie do grupy
net localgroup Administratorzy User /add
net localgroup Administratorzy User /delete

Hasło nigdy nie wygasa
wmic UserAccount where Name='User' set PasswordExpires=False

net user Administrator /FULLNAME:"AAdmin" 
net user Administrator AAdmin
net user Administrator /ACTIVE:Yes
net user Administrator /PASSWORDCHG:Yes 

net accounts ————————————————— 23.10.2021 / 03.12.2024

net accounts
net accounts /Lockoutthreshold:10 - Liczba prób logowania tu 10 prób
net accounts /lockoutwindow:30 - Okno obserowwania blokady 30 minut
net accounts /lockoutduration:10 - Czas trwania blokdady 10 minut

net accounts
net accounts /Lockoutthreshold:5
net accounts /lockoutduration:10
net accounts /lockoutwindow:10

Ustawia maksymalną liczbę dni ważności hasła.

net accounts /MAXPWAGE:999
net accounts /MAXPWAGE:UNLIMITED

Ustawia minimalną liczbę dni, które muszą minąć, zanim użytkownik może zmienić hasło.

net accounts /MINPWAGE:999
net accounts /MINPWAGE:0

Jak podejrzeć ustawienia haseł i blokowania konta w Windows/CMD?

W AD hasło nigdy nie wygasa (nie testowane)

Set-ADUser -Identity "nazwa_użytkownika" -PasswordNeverExpires $true

SMB 1 ———————————————————– 15.02.2021
powershell jako administrator

Protokół SMBv1
Wykrywanie:

Get-WindowsFeature FS-SMB1

Wyłączanie:

Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol

Włączanie:

Enable-WindowsOptionalFeature -Online -FeatureName smb1protocol

lub
Wykrywanie:

Get-WindowsOptionalFeature –Online –FeatureName SMB1Protocol

Wyłączanie:

Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol

Włączanie:

Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol

Protokół SMBv2/SMBv3
Wykrywanie:

Get-SmbServerConfiguration | Select EnableSMB2Protocol

Wyłączanie:

Set-SmbServerConfiguration -EnableSMB2Protocol $false

Włączanie:

Set-SmbServerConfiguration -EnableSMB2Protocol $true

lub
Wykrywanie:

Get-SmbServerConfiguration | Select EnableSMB2Protocol

Wyłączanie:

Set-SmbServerConfiguration –EnableSMB2Protocol $false

Włączanie:

Set-SmbServerConfiguration –EnableSMB2Protocol $true

winsock reset ————————————————— 03.08.2021

netsh winsock reset c:\TMP\winsocklog.txt

Kontrola karty sieciowej z cmd ———————————- 24.11.2020

netsh interface ipv4 show config
^ konfiguracja wszystkich interfejsów
Powerhell
Get-NetIPInterface
Zmiana nazwy połączenia sieicowego
Rename-NetAdapter -Name „” -NewName „
Rename-NetAdapter -Name „Dom” -NewName „Dom-Ethernet”
Rename-NetAdapter -Name „Wi-Fi” -NewName „Dom-Wi-Fi”
^ to można zmienicć na nazwę firmy np kontak.
CMD
Włączenie/wyłączenie interfejsu dokonamy również za pomocą komend:
netsh interface set interface „” disabled
netsh interface set interface „” enabled

http://slow7.pl/windows-7/item/136-jest-we-mnie-moc-konfiguracja-interfejsow-sieciowych-i-dostep-zdalny-z-wykorzystaniem-powershella?tmpl=component&print=1

Zmiana IP z CMD

netsh interface ip show interfaces "Dom-Ethernet"
netsh interface ipv4 set address name = "Dom-Ethernet" static 192.168.28.221 255.255.255.0 192.168.0.3
netsh interface ipv4 set address name = "Dom-Ethernet" source = dhcp
DNS:
netsh interface ipv4 set dns name = "Dom-Ethernet" static 192.168.28.3
^ Piewszy domyślny \/dns-y 1,2,3
netsh interface ip add dns name="Dom-Ethernet" addr=192.168.28.3 index=1
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.8.8 index=2
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.4.4 index=3
z DHCP 
netsh interface ip set dns name="Dom-Ethernet" source=dhcp

netsh interface ip show interfaces "Dom-Ethernet"
netsh interface ipv4 set address name = "Dom-Ethernet" static 192.168.28.221 255.255.255.0 192.168.0.3
netsh interface ipv4 set address name = "Dom-Ethernet" source = dhcp
DNS:
netsh interface ipv4 set dns name = "Dom-Ethernet" static 192.168.28.3
^ Piewszy domyślny \/dns-y 1,2,3
netsh interface ip add dns name="Dom-Ethernet" addr=192.168.28.3 index=1
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.8.8 index=2
netsh interface ip add dns name="Dom-Ethernet" addr=8.8.4.4 index=3
z DHCP 
netsh interface ip set dns name="Dom-Ethernet" source=dhcp

Windows 10 Home to Pro —————————————— 23.10.2020

Robimy to bez internetu
VK7JG-NPHTM-C97JM-9MPGT-3V66T – To jest klucz transportowy do zmiany

NVVV8-XXXXX-FVV86-XXXXX-WA8XF – klucz w asus marketing aka
NRVVV-XXXXX-2AA2W-XXXXX-RAKTR – KLUCZ W SURFACE GO AKA


slmgr.vbs /dli
slmgr.vbs /dlv
slmgr.vbs /upk
slmgr.vbs -ipk VK7JG-NPHTM-C97JM-9MPGT-3V66T
slmgr.vbs -ato
slmgr.vbs -ipk NRVVV-XXXXX-2AA2W-XXXXX-RAKTR


dism /online /set-edition:ServerStandard /productkey:NRVVV-XXXXX-2AA2W-XXXXX-RAKTR /accepteula
dism /online /set-edition:Core /productkey:NRVVV-XXXXX-2AA2W-XXXXX-RAKTR /accepteula
DISM /online /Get-CurrentEdition
DISM /Online /Cleanup-Image /CheckHealth

slui 4

Plan zasilania ————————————————– 07.01.2021
Plan zasilania wysoka wydajność:

powercfg -duplicatescheme e9a42b02-d5df-448d-aa00-03f14749eb61

psexec64 ——————————————————– 07.01.2021
Jak uruchomić komendę z uprawnieniami administratora

C:\TMP\PSTools\psexec64.exe -u Administrator -p haslo „C:\TMP\bufor-czyszczenie.bat” select
C:\TMP\PSTools\psexec64.exe -u Administrator -p haslo „C:\TMP\bufor-czyszczenie.bat”

Ferro Backup ————————————————–

FBSServer.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\
FBSWorker.exe
C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" dir=in action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSServer.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" dir=out action=allow program="C:\Program Files (x86)\FERRO Software\Ferro Backup System\FBSWorker.exe" enable=yes

Porty ———————————————————– 17.12.2021


netsh advfirewall firewall add rule name= "Port_1433_TCP_SQL" dir=in action=allow protocol=TCP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_UDP_SQL" dir=in action=allow protocol=UDP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_TCP_SQL" dir=out action=allow protocol=TCP localport=1433
netsh advfirewall firewall add rule name= "Port_1433_UDP_SQL" dir=out action=allow protocol=UDP localport=1433

netsh advfirewall firewall add rule name= "Port_1434_TCP_SQL" dir=in action=allow protocol=TCP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_UDP_SQL" dir=in action=allow protocol=UDP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_TCP_SQL" dir=out action=allow protocol=TCP localport=1434
netsh advfirewall firewall add rule name= "Port_1434_UDP_SQL" dir=out action=allow protocol=UDP localport=1434

netsh advfirewall firewall add rule name= "Port_32343_TCP_Sage" dir=in action=allow protocol=TCP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_UDP_Sage" dir=in action=allow protocol=UDP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_TCP_Sage" dir=out action=allow protocol=TCP localport=32343
netsh advfirewall firewall add rule name= "Port_32343_UDP_Sage" dir=out action=allow protocol=UDP localport=32343

netsh advfirewall firewall add rule name= "Port_32344_TCP_Sage" dir=in action=allow protocol=TCP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_UDP_Sage" dir=in action=allow protocol=UDP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_TCP_Sage" dir=out action=allow protocol=TCP localport=32344
netsh advfirewall firewall add rule name= "Port_32344_UDP_Sage" dir=out action=allow protocol=UDP localport=32344

netsh advfirewall firewall add rule name= "Port_32342_TCP_Sage" dir=in action=allow protocol=TCP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_UDP_Sage" dir=in action=allow protocol=UDP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_TCP_Sage" dir=out action=allow protocol=TCP localport=32342
netsh advfirewall firewall add rule name= "Port_32342_UDP_Sage" dir=out action=allow protocol=UDP localport=32342

SQL 2016 ——————————————————– 17.12.2021

C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe
C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL13.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes

SQL 2014 ——————————————————– 17.12.2021


C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe

C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESSROGER\MSSQL\Binn
C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=in action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL14.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes

SQL 2019 ——————————————————– 02.02.2025

C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\sqlceip.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\xpadsi.exe
C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.com

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.com" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.com" enable=yes

SQL 2022 ——————————————————– 02.02.2025

C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\ExtHost.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\fdhost.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\fdlauncher.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\Launchpad.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\sqlceip.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\xpadsi.exe
C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.com

netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\BackupToUrl.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\DatabaseMail.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\DCEXEC.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\fdhost.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\fdhost.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\fdlauncher.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\fdlauncher.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\Launchpad.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\Launchpad.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLAGENT.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\sqlceip.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\StretchCodeGen.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\xpadsi.exe" enable=yes
netsh advfirewall firewall add rule name="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.com" dir=out action=allow program="C:\Program Files\Microsoft SQL Server\MSSQL16.SQLEXPRESS\MSSQL\Binn\SQLIOSIM.com" enable=yes

7zip ———————————————————— 28.12.2021
Pakowanie z pomijanymi katalogami


"C:\Program Files\7-Zip\7z.exe" a -tzip -phaslo "\\192.168.0.16\Backup\Firma_DS_%dow%.zip" "-xr@c:\Backup\XFirma_DS.txt"  @c:\Backup\Firma_DS.txt -scsWIN  >> C:\Backup\Log\Firma_7z_Log.txt

XFirma_DS.txt
*\CAD
"*\KREOWANIE I WDRAŻANIE PRODUKTU\INNE\CHRONOMETRAŻ\nagrania"
"*\KREOWANIE I WDRAŻANIE PRODUKTU\INNE\CHRONOMETRAŻ\NAGRANIA"
"*\Marketing\materiały filmowe"
"*\Marketing\Zdjęcia"

0x0000011b —————————————————— 07.01.2021
Błąd 0x0000011b przy instalacji drukarki udostępnionej

FIX: Error 0x0000011b – Cannot Connect to Printer on Windows 10/7 (Solved)

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\
RpcAuthnLevelPrivacyEnabled = 0 DWORD (32-bit)

VPN ——————————————————————- 17.01.2022

wusa /uninstall /kb:5009543

Outlook ————————————————————— 20.01.2022

https://pl.telusuri.info/articles/outlook/ogranichenie-na-maksimalnij-razmer-vlozhenij-v-outlook.html

Outlook ————————————————————— 26.11.2024
Zmiana wielkości na maksymalną plików OST/PST (dla Microsoft 365 Outlook)

REG ADD "HKCU\SOFTWARE\Microsoft\Office\16.0\Outlook\PST" /v "WarnLargeFileSize" /t REG_DWORD /d "4090445042" /f
REG ADD "HKCU\SOFTWARE\Microsoft\Office\16.0\Outlook\PST" /v "MaxLargeFileSize" /t REG_DWORD /d "4294967295" /f

Outlook ————————————————————— 05.12.2023

Przeniesienie kontaktów z poza "Do..." (w noewej wiadomości) na inny komputer
Plik poza "Do..." znajduje się w lokalizacji np:
c:\Users\user\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Autocomplete_0_31BC62F902B2084189572A8E87C58BC1.dat

Edycja „Do…” za pomocą programu N2KEdit https://www.nirsoft.net/utils/outlook_nk2_edit.html

Office —————————————————————- 28.01.2022
Pięć ostatnich cyfr z office

cscript "C:\Program Files (x86)\Microsoft Office\Office15\OSPP.VBS" /dstatus
cscript "C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS" /dstatus
cscript "C:\Program Files (x86)\Microsoft Office\Office16\OSPP.VBS" /dstatus

cscript "C:\Program Files\Microsoft Office\Office16\OSPP.VBS" /dstatus 
cscript "C:\Program Files\Microsoft Office\Office15\OSPP.VBS" /dstatus
cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /dstatus

——————————————————————- Płatnik hasło

Płatnik – wyłączenie zmiany hasła co 30 dni

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Asseco Poland SA\Płatnik\X.XX.XX\Parametry

HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Asseco Poland SA\Płatnik\10.02.002\Parametry
HKEY_LOCAL_MACHINE\SOFTWARE\Asseco Poland SA\Płatnik\
HKEY_LOCAL_MACHINE\SOFTWARE\Asseco Poland SA\Płatnik\X.XX.XX\Parametry

LimitHasla = 365

——————————————————————- 15.06.2022 Office jak się zrobi Standard z Professional

https://docs.microsoft.com/en-us/answers/questions/596247/office-2021-ltsc-and-spla.html
when you published here the supported ID to use with the ODT TOOL .

ProPlus2021Volume
Standard2021Volume
ProjectPro2021Volume
ProjectStd2021Volume
VisioPro2021Volume
VisioStd2021Volume

you are aware that the SPLA versions are not listed. However, they are available when you configure the .xml file in config.office.com
Then, keeping on repeating that the ID supported are :

ProPlus2021Volume
Standard2021Volume
ProjectPro2021Volume
ProjectStd2021Volume
VisioPro2021Volume
VisioStd2021Volume

does not help much. if they do not match also the ODT TOOL .xml file created with SPLA options…
When launching the installation, the error is thrown if SPLA is in the .xml file.

——————————————————————- 09.06.2022 Firefox

SSL_ERROR_UNSUPPORTED_VERSION on Firefox

about:config
security.tls.version.min wartość ustawić na 1

——————————————————————- 23.05.2022 Komendy nowego control panel

https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app

ms-settings:network-status – Wyświetla status sieci
ms-settings:network-vpn
——————————————————————- 14.03.2022 RDS – Instalacja serwera

W gałęzi HKLM \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ RCM \ Licensing Core należy zmienić wartość DWORD parametru o nazwie LicensingMode z 5 na

2) – jeśli stosowane jest licencjonowanie według urządzenia (na urządzenie)
4 – podczas korzystania z licencjonowania użytkownika RDS (na użytkownika)

Użyjemy lokalnego edytora gpedit.msc. Przejdź do Konfiguracja komputera -> Składniki systemu Windows -> Usługi pulpitu zdalnego -> Host sesji zdalnej -> Licencje (Konfiguracja komputera -> Szablony administracyjne -> Składniki systemu Windows -> Usługi pulpitu zdalnego -> Host sesji pulpitu zdalnego \ Licencjonowanie).

Serwer Licencjonowania – nazwa
Tryb licencjonowania – user/urządzenie

https://pl.telusuri.info/articles/windows-server-2012-r2/oshibka-ne-zadan-rezhim-licenzirovaniya-dlya-servera-uzla-seansov-udalennih-rabochih-stolov.html

——————————————————————- 02.02.2022 Domyślny klient pocztowy

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail
Dodać wpis typu: Wartość ciągu
Nazwa domyślna (Domyślna)
Nazwa klienta pocztowego jako wartość np:
eM Client
Mozilla Thunderbird

———————————————————————————— 13.11.2022 Kasacja logów tranzakcyjne MSSQL

Task -> Shrink -> Databases

Jeżeli się nie da:
Właściwości bazy Options przełączyć z trybu Full na Simple

——————————————————————- 06.09.2022 Migracja kontrolera domeny

dnscmd /EnumZones – Sprawdzenie ról kontrolera doemeny
1. Nowy serwer Manager serwera -> zarządzaj -> Dodaj role i funkcje -> inst. oparta na funkcjach -> Active Directory Domain Services (Rola) Usługi domenowe Active Directory
=====
*Gdyby była potrzebna migracja systemu plików SYSVOL z FRS na DFS to:
1. Zrobić backup katalogu C:\Windows\SYSVOL
Powershell
dfsrmig /getglobalstate
dfsrmig /setglobalstate 1
dfsrmig /setglobalstate 2
dfsrmig /setglobalstate 3
dfsrmig /getmigrationstate
Inofmracje z https://www.rebeladmin.com/2015/04/step-by-step-guide-for-upgrading-sysvol-replication-to-dfsr-distributed-file-system-replication/
=====
2. Manager serwera konfiguracja kontrolera domeny
-1 Dodanie do instniejącej domeny
-2 Hasło DRSM trudnedozlamaniahaslo
-3 Upgrade DNS (next)
-4 Next
-5 Scieżki:
–5a Folder bazy danych: C:\Windows\NTDS
–5b Folder plików dziennika C:\Windows\NTDS
–5c Folder SYSVOL C:\Windows\SYSVOL
-6 Next
-7 Next (View Scrypt)
— Install
Restart
powershell – Administrator
netdom query fsmo – ta komenda wyświetla role serwer na kontrolerze domeny (gdzie są przypisane)

Schema master SERWER3.NowySerwerNazwa.local
Domain naming master SERWER3.NowySerwerNazwa.local
PDC SERWER3.NowySerwerNazwa.local
RID pool manager SERWER3.NowySerwerNazwa.local
Infrastructure master SERWER3.NowySerwerNazwa.local
The command completed successfully.

Move-ADDirectoryServerOperationMasterRole -Identity NowySerwerNazwa -OperationMasterRole SchemaMaster, DomainNamingMaster, PDCEmulator, RIDMaster, InfrastructureMaster

^ To przenosi role należy wskazać nazwę serwera gdzie ma być przeniesnione (tu NowySerwerNazwa)

Windows – A Delegation For This DNS Server Cannot Be Created

Windows Server – Locating, Transferring, and Seizing FSMO Roles

——————————————————————- 2024.02.18 Włączenie Silverlight

Jak uruchomić Silverlight na Windows 10, Windows 11 i nowszym

——————————————————————- 2024.03.20 Sesje RDP jako admin

mstsc.exe plik.rdp /admin

——————————————————————- 2925.01.02 Zmiana portu RDP z 3889

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber

——————————————————————- 05.04.2024 Kasowanie plików starszych niż …

forfiles /p „C:\Backup\Dane” /s /m *.* /d -10 /c „cmd /c if @isdir==FALSE del @file”

/p „C:\Backup\Dane”: Określa ścieżkę do folderu, w którym chcesz przeprowadzić wyszukiwanie.
/s: Oznacza, że ​​wyszukiwanie ma być rekursywne, obejmując również podfoldery.
/m *.*: Określa, że ​​szukamy dowolnych plików (*.*).
/d -10: Oznacza, że ​​szukamy plików, które są starsze niż 10 dni.
/c „cmd /c if @isdir==FALSE del @file”: To jest polecenie, które zostanie wykonane dla każdego znalezionego pliku. W tym przypadku sprawdzamy, czy to nie jest folder (@isdir==FALSE) i usuwamy ten plik (del @file)

——————————————————————- 21.09.2023 Zmiana strefy czasowej

https://pl.gadget-info.com/can-t-change-date-time-windows

Metoda 4 – Lokalna polityka bezpieczeństwa

Jeśli pojawi się komunikat o błędzie „Wymagany przywilej nie jest trzymany przez klienta” podczas próby użycia wiersza polecenia, przejdź do Panelu sterowania, Narzędzia administracyjne, Zasady zabezpieczeń lokalnych, a następnie przejdź do Zasady lokalne \ Przypisywanie praw użytkownika i upewnij się, że Zmień czas systemowy i Zmień uprawnienia strefy czasowej są przyznawane administratorom .

——————————————————————- 2023.05.04 .NET

https://dotnet.microsoft.com/en-us/download/dotnet

——————————————————————- 04.07.2023 Kasowanie dysków siecowych

Zdalne sprawdzanie zamapowanych dysków na kontach użytkowników

——————————————————————- Synology NAS

Mogawki
Zainstalować Pakiet:
Snapshot Replication

——————————————————————- Synology NAS

Uwieżytelnianie dwuskładnikowe:
Panel Sterowanie -> Bezpieczeństwo -> Konto
Zaznaczyć: Wymuś uwieżytelnianie dwuelementtowe dla następujących użytkowników
Użytkownicy grupy administratorów
Zastosuj
Skonfiguruj Teraz

——————————————————————- Axence

4436
C:\Program Files (x86)\Axence\nVision

old
netsh firewall add portopening TCP 4436 Port_4436_TCP
netsh firewall add portopening UDP 4436 Port_4436_UDP

te używać:
netsh advfirewall firewall add rule name= „Port_4436_TCP_axence” dir=in action=allow protocol=TCP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=in action=allow protocol=UDP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=out action=allow protocol=TCP localport=4436
netsh advfirewall firewall add rule name= „Port_4436_UDP_axence” dir=out action=allow protocol=UDP localport=4436
netsh advfirewall firewall add rule name=”C:\Program Files (x86)\Axence\nVision” dir=in action=allow program=”C:\Program Files (x86)\Axence\nVision” enable=yes
netsh advfirewall firewall add rule name=”C:\Program Files (x86)\Axence\nVision” dir=out action=allow program=”C:\Program Files (x86)\Axence\nVision” enable=yes

——————————————————————- Skróty Windows 10/11

https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app

——————————————————————- 0x800f0922

https://learn.microsoft.com/pl-pl/troubleshoot/windows-server/installing-updates-features-roles/error-0x800f0922-installing-windows-updates
powershell

Dism /english /online /get-packages /format:table | findstr /i „Staged”

Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~x86~pl-PL~10.0.19041.4894 | Staged | Language Pack | 16.09.2024 07:52
Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~x86~~10.0.19041.4894 | Staged | OnDemand Pack | 16.09.2024 07:52
Microsoft-Windows-MSPaint-FoD-Package~31bf3856ad364e35~x86~~10.0.19041.4894 | Staged | OnDemand Pack | 16.09.2024 07:52
Microsoft-Windows-UserExperience-Desktop-Package~31bf3856ad364e35~x86~~10.0.19041.4842 | Staged | OnDemand Pack | 16.09.2024 07:52
Package_for_RollupFix~31bf3856ad364e35~x86~~19041.4894.1.9 | Staged | Security Update | 16.09.2024 07:52

Dism /online /remove-package /PackageName:Package_for_RollupFix~31bf3856ad364e35~amd64~~14393XXXX

Dism /online /remove-package /PackageName:Package_for_RollupFix~31bf3856ad364e35~x86~~19041.4894.1.9
Dism /online /remove-package /PackageName:Microsoft-Windows-UserExperience-Desktop-Package~31bf3856ad364e35~x86~~10.0.19041.4842
Dism /online /remove-package /PackageName:Microsoft-Windows-MSPaint-FoD-Package~31bf3856ad364e35~x86~~10.0.19041.4894
Dism /online /remove-package /PackageName:Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~x86~~10.0.19041.4894
Dism /online /remove-package /PackageName:Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~x86~pl-PL~10.0.19041.4894

reg query „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI” /v ID

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI
ID REG_SZ {C4A508C5-31B2-4790-8605-B18416495ECD}

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI
ID REG_SZ {}

reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Maintenance\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C4A508C5-31B2-4790-8605-B18416495ECD}” /f
reg delete „HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\PI\SecureBootEncodeUEFI” /f

——————————————————————- Wazuh – Open Source XDR. Open Source SIEM.

Zmienić


  
    no
    10000 
    800
  

——————————————————————- Jak trwale usunąć Outlook z Windows

Microsoft jednocześnie podzielił się metodą na trwałą deinstalację komponentu Outlook z systemów Windows 11 i Windows 10. Nie, skorzystanie z menu dodaj i usuń programy nie jest dostatecznie skuteczne. Trzeba natomiast skorzystać z Windows PowerShell w trybie administratora, gdzie wpisać należy komendę:

Remove-AppxProvisionedPackage -AllUsers -Online -PackageName (Get-AppxPackage Microsoft.OutlookForWindows).PackageFullName

W dalszej kolejności należy dodać do rejestru następującą wartość:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\Orchestrator\UScheduler_Oobe\OutlookUpdate

Pozostanie już tylko dodanie ustawienia REG_SZ o nazwie BlockedOobeUpdaters z wartością [„MS_Outlook”]. To sprawi, że Outlook nie powróci po usunięciu z kolejnymi aktualizacjami.

——————————————————————- 02.02.2025 Obejście instalacji Windows 11 TPM

Pobrać i wypakować ISO systemu, wejść do katalogu sources
setupprep.exe /Product Server

——————————————————————- 04.02.2025 SQL Odbudowa indeksów wszystkich tabel

DECLARE @TableName NVARCHAR(256)
DECLARE @SQL NVARCHAR(MAX)

— Tabela tymczasowa do przechowywania nazw tabel
DECLARE table_cursor CURSOR FOR
SELECT TABLE_SCHEMA + ’.’ + TABLE_NAME
FROM INFORMATION_SCHEMA.TABLES
WHERE TABLE_TYPE = 'BASE TABLE’

OPEN table_cursor
FETCH NEXT FROM table_cursor INTO @TableName

WHILE @@FETCH_STATUS = 0
BEGIN
SET @SQL = 'ALTER INDEX ALL ON ’ + @TableName + ’ REBUILD;’
PRINT @SQL — Możesz usunąć ten wiersz po testach
EXEC sp_executesql @SQL
FETCH NEXT FROM table_cursor INTO @TableName
END

CLOSE table_cursor
DEALLOCATE table_cursor

——————————————————————- 05.02.2025 Odbudowa pojedyńczej tabeli

ALTER INDEX ALL ON HM.PR REBUILD;

*HM.PR
Schema HM
Table PR

ALTER INDEX ALL ON HM.PR REORGANIZE;

——————————————————————- 05.02.2025 Sprawdzenie stanu fragmentacji bazy danych

SELECT
dbschemas.[name] AS 'Schema’,
dbtables.[name] AS 'Table’,
dbindexes.[name] AS 'Index’,
indexstats.avg_fragmentation_in_percent
FROM sys.dm_db_index_physical_stats(DB_ID(), NULL, NULL, NULL, 'LIMITED’) AS indexstats
JOIN sys.tables AS dbtables ON dbtables.[object_id] = indexstats.[object_id]
JOIN sys.schemas AS dbschemas ON dbtables.[schema_id] = dbschemas.[schema_id]
JOIN sys.indexes AS dbindexes ON dbindexes.[object_id] = indexstats.[object_id]
AND indexstats.index_id = dbindexes.index_id
ORDER BY indexstats.avg_fragmentation_in_percent DESC;

——————————————————————- 02.07.2025 Problemy z VPN L2TP

VPN Error: The L2TP connection attempt failed because the security layer encountered a processing error during the initial negotiations with the remote computer

ipconfig /release
ipconfig /renew
netsh winsock reset
netsh int ip reset

https://answers.microsoft.com/en-us/windows/forum/all/w10-vpn-error-the-l2tp-connection-attempt-failed/b92aa786-73f7-4723-91a8-96675c3ee6f3

——————————————————————- Drukowanie więcej niż 15 plików 28.07.2025

Dzień dobry,

Proszę sprawdzić czy opcja Drukuj jest widoczna tak:
PPM na pliku→Pokaż więcej opcji→Czy tam widać opcje Drukuj
Domyślnie Win10/11 tak można wydrukować 15 plików
Można spróbować to rozszerzyć w Edytorze rejestru w kluczu:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer

dodając wartość DWORD (32-bitowa) o nazwie MultipleInvokePromptMinimum
i w Dane wartości: wpisując odpowiednią liczbę np. 30 (Dziesiętna)
Pozdrawiam

https://learn.microsoft.com/pl-pl/answers/questions/4365467/windows-11-a-drukowanie-wielu-plik-w

——————————————————————- Zakładanie lokalnego konta na zablokowanym PC 29.08.2025

Boot off a Windows 10 DVD (or USB)reset-windows-10-password-replace-utilman
When the WINDOWS SETUP screen appears, press SHIFT+F10 to launch a CMD window
Type ren d:\windows\system32\utilman.exe utilman.exe.bak and press the ENTER key
Type copy d:\windows\system32\cmd.exe d:\windows\system32\utilman.exe and press the ENTER key
Exit the Windows 10 setup (just power down)
Boot normally to your hard drive
At the Login Screen click the EASE OF ACCESS icon (beside the Power icon in the bottom right corner of the screen). Because of step reset-windows-10-password-create-admin4, this will launch a CMD window
Type net user test /add and press the ENTER key
Type net localgroup administrators test /add and press the ENTER key
Press ALT+F4 to close the CMD prompt
Click the Power icon (bottom right corner of the screen) and select RESTART
Sign in as TEST without a password

https://learn.microsoft.com/en-us/answers/questions/187973/windows-recovery-cmd

——————————————————————- sql server management studio 21 maintenance plan not available 24.09.2025

https://techcommunity.microsoft.com/blog/sqlserver/announcing-the-release-of-sql-server-management-studio-ssms-21-2-5/4422488

https://learn.microsoft.com/en-us/answers/questions/2277339/maintenance-plan-wizard-not-available-in-sql-serve

——————————————————————- Przystawka użytkownicy i grupy 12.10.2025

lusrmgr.msc

——————————————————————- Harmonogram zadań 13.10.2025

taskschd.msc

——————————————————————- Konfiguracja serwera VPN/L2TP na Mikrotik 09.11.2025

https://netadminpro.pl/serwer-l2tp-konfiguracja-mikrotik/#pula

——————————————————————-
——————————————————————-
——————————————————————-
——————————————————————-
——————————————————————-